Top 5 Mistakes Lawyers Make With Digital Evidence

by | Jan 30, 2026 | Uncategorized | 0 comments

Top 5 Mistakes Lawyers Make With Digital Evidence  –      Copyright 2026, Steve Burgess

After forty years working with attorneys on digital evidence, I’ve seen the same mistakes cost cases time and again. Here are five of the most common – and how to avoid them.

Mistake #1: Waiting Too Long to Preserve Evidence

Digital evidence disappears. Every time someone uses a device, it writes over old data. Even just turning a computer, tablet, or phone on writes new data and can irretrievably overwrite important logs and other files. Cloud accounts purge. Phones get reset. Employees leave with their devices.

In one employment case, an attorney contacted me three weeks after filing. By then, IT had wiped the defendant’s laptop and reassigned it. Emails, browsing history – all gone. The case settled for pennies.

What to do? Send a preservation letter immediately – before you file, if possible. Be specific: phones, computers, cloud accounts, backup drives. Then follow up. If they drag their feet, file for a preservation order.

Mistake #2: Letting Your Client Handle the Evidence

Your clients mean well. They forward screenshots, print text messages, save files to thumb drives. But every time they touch that evidence, they change it. Metadata gets altered. Timestamps shift. Valuable metadata disappears when a file gets saved for you as a PDF.

I worked a family law case where a mother scanned threatening texts from her ex-husband as PDFs. The texts were real, but the metadata showed they were created the day before the hearing. The judge excluded them. She lost custody. A forensic extraction would have authenticated those messages in five minutes.

Don’t let clients collect their own evidence. Bring in a forensic expert early to properly image devices with full chain of custody. It costs a fraction of what you’ll lose if evidence gets excluded.

Mistake #3: Relying on Screenshots

Screenshots are convenient and visual. But from a forensic perspective, they’re basically worthless as evidence.

A screenshot is just a picture. It doesn’t prove when something was created, who created it, or whether it’s altered. Anyone with photo editing software can fake one in seconds.

In one business fraud case, an attorney submitted Slack screenshots as his centerpiece evidence. The defense expert showed the timestamps didn’t match, the formatting was off, and the metadata was wrong. Screenshots excluded. Case collapsed. The screenshots were real – but without authentication, useless.

Get actual data from the source. Forensically image the phone, the computer, or the flash drive. Subpoena the platform. Capture the full metadata. Screenshots can illustrate a point, but they can’t prove it.

Mistake #4: Ignoring the Metadata

Metadata is the hidden information in every file – creation dates, edit times, GPS coordinates, device identifiers. It’s the DNA of digital evidence.

Many lawyers ignore it or don’t know how to read it. That’s a problem, because metadata often tells a different story than the file itself.

In one contract dispute, the plaintiff submitted a PDF agreement dated March 15. The defendant’s expert checked the metadata and found it was actually created April 3 – two weeks after the claimed signing date. It had also been edited on April 5. Case dismissed.

Always check metadata before relying on digital files. If you don’t know how to read it, hire someone who does.

Mistake #5: Calling the Expert Too Late

Most attorneys call me when they’re already in trouble – evidence deleted, authenticity challenged, judge threatening sanctions. By then, it’s often too late.

I worked with an attorney who gathered evidence for six months on his own. When he finally brought me in before trial, we discovered half the “evidence” was inadmissible. Broken chain of custody. Altered metadata. No authentication. The case settled for much less than it should have.

A forensic expert can identify what evidence exists, preserve data properly, authenticate documents for court, and testify to methodology under FRCP’s Rule 702. Early involvement doesn’t just protect your evidence – it strengthens your entire case.

The Takeaway

Treat digital evidence like physical evidence. You wouldn’t let your client collect their own blood samples. The same goes for phones, computers, emails, and cloud-based data.

Preserve early. Don’t let clients handle evidence. Get actual data, not screenshots. Check metadata. Involve an expert before trouble hits.

Your case will thank you.

Related Posts

20 Digital Forensics Facts for Attorneys

20 Digital Forensics Facts for Attorneys copyright 2025 Steve Burgess Deleted ≠ gone: Most deleted files remain recoverable until overwritten. Every case is a data case: Even “non-digital” disputes usually contain text messages, emails, or documents. Forensic imaging:...

Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court

Screenshots Are Barely Evidence: How to Authenticate Digital Data in Court By Steve Burgess, Copyright 2025 Screenshots are convenient. They’re quick, visual, and easy for clients to share — but in the courtroom, convenience can be a trap. Screenshots alone rarely...

How to Dodge Pegasus Spyware

How to Dodge Pegasus Spyware, copyright 2025 by Steve Burgess Pegasus was a superfast magical horse from Greek mythology that could fly over barriers, see everything from above, avoid detection, and had a really cute family in Disney’s Fantasia. The other Pegasus is a...

Picture This: Keep Your Kids Safe Online.

Copyright 2025, Steve Burgess Yes, social media is fun. It helps to keep us in touch and stay in relationship with friends and loved ones. Even folks you haven’t seen or heard from in decades. And, as we all know, our kids are the most beautiful, creative, intelligent...

Two Factor Authentication Fraud

Two Factor Authentication Fraud - copyright Steve Burgess, 2025 One of the better ways to protect yourself from online fraud is Two-Factor Authentication (2FA). This scheme is also known as 2-Step (or dual-step) Verification or Authentication, or Multi-Factor...

AI and Elder Abuse

AI and Elder Abuse, copyright 20025, Steve Burgess The news is full of AI (Artificial Intelligence) stories. How will it empower us in our jobs? Whose job will it take next? Is it creating actual fake news?  While there’s a lot of “we’ll see” in the answers to these...

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Pin It on Pinterest

Share This